MDM
Have You Registered for Centralize Policy, Control and Enforcement May 15th?
Activate the IT Transformation with Unified Access: Part 4 – Centralized Policy, Control, and Enforcement Wednesday, May 15, 2013 10am-11am PDT | Register Now Don’t miss the next in line of our five-part Unified Access Webinar Series on May 15th to hear how organizations in…
See How Organizations Use Cisco ISE to Centralize Policy and Secure Access
Activate the IT Transformation with Unified Access: Part 4 – Centralized Policy, Control, and Enforcement Wednesday, May 15, 2013 10am-11am PDT | Register Now With more users and devices being added to your network every day, unified access and central policy control have become c…
MDM and Cisco’s ISE?
Mobile Device Management or MDM is ideal for addressing many challenges inherent to our ‘Bring your own Device’ culture. MDM can help enforce policy for mobile devices but when you look closer, you begin to realize it does not solve everything. The challenge is when we ask our MDM technology to make…
Shedding More Light on MDM
My friends at Cisco’s TechWiseTV have taken MDM to heart and have offered some keen insight from a geek’s POV (point of view) into MDM. Starting with a primer on MDM, Networking 101: MDM, Jimmy Ray answers the questions on what is MDM and what can it do for my organization in his entertaining and ed…
Consider the Best Approach for Your BYOD Mobility Environment
MDM Today and the Future Mobile devices have quickly become a mainstay in enterprise environments and continue to be consumer driven, and yet they find their way into our day-to-day business lives. As these new devices are being brought into the work environment by employees, enterprise IT is increa…
Securing a BYOD Environment Requires Deployment Flexibility
When Cisco integrated our Identity Services Engine (ISE) platform with leading mobile device management (MDM) systems, it was clear from the start that we had struck a chord among IT administrators trying to wrestle with the onslaught of employee-owned mobile devices accessing their networks. First…
Judge for yourself: Taking Dell to task on “holistic” security claims
In case you missed it, Network World’s Ellen Messmer published a rather surprising article on how Dell was going to “trump” Cisco in the information security market as a result of some recent acquisitions. Now certainly Dell is entitled to their beliefs. They’re in a difficult position right now, as…
Cisco and Citrix Join Forces to Bring New Mobile Device Management Services to Market
Employees, and many business, want to allow personal devices to be used at work, and potentially for work. However, balancing that with corporate policies for information security, clear rights-of-use, liability, and then bounding it within an acceptable IT cost structure is no small feat. Cisco joi…
Securing Any Device—For the Exceptional Connected Experience
Secure access continues to be paramount for a connected world. People connect to the Internet for business and for personal use, from wired, wireless or mobile devices—locally and remotely. The Internet is a global system of interconnected networks. User devices, the Internet, and all computer netwo…